Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.
new discussion 05 May 2015
So this maybe a little long but here is the general jist of the article - SEP can install SEE - using a specialized group and the Host Integrity Policy - you can Install or Upgrade the Client using the steps below. SEE ver 11 has no embedded way to native deploy or upgrade its own agents - But you can use SEP 12.1 RU5 and HIC policies to do that for you. Keep in Mind - you need to know your ...
new discussion 05 May 2015
So this maybe a little long but here is the general jist of the article - SEP can install SEE - using a specialized group and the Host Integrity Policy - you can Install or Upgrade the Client using the steps below. SEE ver 11 has no embedded way to native deploy or upgrade its own agents - Keep in Mind - you need to know your network and your clients to use HIC to install or upgrade the ...
new discussion 05 May 2015
So this maybe a little long but here is the general jist of the article - SEP can install SEE - using a specialized group and the Host Integrity Policy - you can Install or Upgrade the Client using the steps below. SEE ver 11 has no embedded way to native deploy or upgrade its own agents - But you can use SEP 12.1 RU5 and HIC policies to do that for you. Keep in Mind - you need to know your ...
new discussion 05 May 2015
So this maybe a little long but here is the general jist of the article - SEP can install SEE - using a specialized group and the Host Integrity Policy - you can Install or Upgrade the Client using the steps below. SEE ver 11 has no embedded way to native deploy or upgrade its own agents - Keep in Mind - you need to know your network and your clients to use HIC to install or upgrade the ...
updated article 30 Apr 2015
Content: What is vShield-enabled Shared Insight Cache? Software requirements and prerequisites Installing vShield Endpoint on ESXi hosts Configuring the Symantec Endpoint Protection Security Virtual Appliance installation settings file Installing a Symantec Endpoint Protection Security Virtual Appliance Installing the EPSEC driver on GVMs Enabling Symantec Endpoint Protection clients to use a ...
updated article 29 Apr 2015
WHAT IS USER AUTHENTICATION? Protect access to your networks and websites with strong user authentication by combining multiple identification factors together for enhanced security. Choose from a range of easy-to-use and easy-to-implement secure credentials and digital certificates. AUTHENTICATION PRODUCTS Validation and ID Protection Service (VIP) Federal Risk and Authorization ...
updated article 27 Apr 2015
Symantec Data Loss Prevention We help you protect your data from loss and theft, comply with privacy laws, and safeguard your reputation. Symantec Data Loss Prevention software discovers, monitors, protects and manages your confidential data wherever it’s stored and used – across endpoints, mobile devices, network and storage systems. It consists of a unified management platform, ...
updated article 27 Apr 2015
Meet the all-new Norton.  Boldly go where you want, when you want. NORTON PRODUCTS Norton Security Norton Security with Backup Norton Small Business Norton Mobile Security Norton Online Backup 25GB Norton Utilities Norton Family Premier NortonLive Ultimate Help Desk OTHER DOCUMENTATION Frequently Requested Information Federal Identity, Credential and Access Management (FICAM) Return ...
updated article 27 Apr 2015
What is Symantec Encryption? Symantec’s encryption portfolio provides flexible data protection through a range of offerings including endpoint, file and folder and email encryption. Integration with Symantec Data Loss Prevention delivers added protection by automatically encrypting sensitive data being moved onto removable media devices or residing in emails and files. Robust management ...
updated article 27 Apr 2015
Symantec's Email family of cloud services and products deliver Security, Privacy and Control over your email. Protection from malware, phishing, spam and targeted attacks is combined with BYOD, Secure Email for Smartphones & Tablets, Archiving, Data Loss Prevention & Encryption to compliment your cloud hosted or on-premise mailboxes. FOR MAILBOXES IN THE CLOUD Email Security.cloud Symantec ...
updated article 27 Apr 2015
What is Endpoint Protection? Symantec Endpoint Protection is an endpoint security solution designed to provide a layered approach to defense. Leveraging the power of Symantec's Global Intelligence Network, it detects and removes more malware than any other product in its class*. Unique Insight and SONAR technologies facilitate more accurate detection, faster scan times, and higher performance ...
updated blog entry 04 May 2015
I jumped at the opportunity to write this blog – as my son’s name is Luke and therefore, “Luke, I am your father”. Let’s remember that tense moment in Garbage Compactor 3263827:  after narrowly escaping Death-By-Dianoga, imminent demise again confronts Leia, Luke, Chewbacca and Han as the garbage compactor starts doing what garbage compactors do best.  The young rebels frantically ...
updated blog entry 04 May 2015
SYMANTEC OFFICIAL RULES FOR THE STAR WARS SAGA BLU-RAY FACEBOOK SWEEPSTAKES DRAWING THE STAR WARS DAY FACEBOOK SWEEPSTAKES DRAWING IS OPEN TO LEGAL RESIDENTS OF THE 50 UNITED STATES AND THE DISTRICT OF COLUMBIA (EXCLUDING GUAM, PUERTO RICO, AND ALL OTHER U.S. TERRITORIES AND POSSESSIONS) AND CANADA (EXCLUDING QUEBEC) WHO ARE THE AGE OF MAJORITY IN THEIR STATE OF RESIDENCE AND AT LEAST 18 ...
updated blog entry 04 May 2015
While email remains a significant attack method for cybercriminals, attackers are now setting their sights (and scams!) on social media. In 2014, Symantec observed a 70 percent increase in scams distributed via social media, which often spreads rapidly because people are more likely to click something posted by a friend. Criminals hijacked the power of “social proof” – the idea that we ...
updated blog entry 30 Apr 2015
The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server.  Jouko Pynnönen discovered the zero-day vulnerability in WordPress versions 4.2 and earlier, which allows an attacker to use stored or persistent, cross-site scripting (XSS) bugs to embed code into a WordPress ...
updated blog entry 30 Apr 2015
More than 11,000 files were found to be easily accessible on cloud storage containers, some of which exposed sensitive data such as email addresses, passwords, and credit card transaction logs. That’s according to our research into the risks surrounding infrastructure-as-a-service cloud environments, which found that administrators have been leaking private information through their cloud ...
updated blog entry 29 Apr 2015
In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online ...
updated blog entry 29 Apr 2015
This week a vulnerability dubbed “Heartbleed” was found in the popular OpenSSL cryptographic software library (http://heartbleed.com).  OpenSSL is widely used, often with applications and web servers like Apache and Nginx.   OpenSSL versions 1.0.1 through 1.0.1f contain this vulnerability, which attackers can exploit to read the memory of the systems.  Gaining access to ...
updated blog entry 29 Apr 2015
A bug has been found in the Secure Sockets Layer (SSL) 3.0 cryptography protocol (SSLv3) which could be exploited to intercept data that’s supposed to be encrypted between computers and servers. Three Google security researchers discovered the flaw and detailed how it could be exploited through what they called a Padding Oracle On Downgraded Legacy Encryption (POODLE) attack ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Data Loss ...
updated event 09 Apr 2015
Please note: This meeting has been rescheduled to a week later on Friday, April 17th! Due to an illness, Mike will be unable to attend and present tomorrow. We apologize for the short notice and any inconvenience this may have caused. We hope to see you there next week! Please join us for the next Twin Cities Data Loss Prevention User Group meeting on Friday, April 17th from 11:00am to 3:00pm ...
new event 10 Mar 2015
Presented by: Pete Lindstrom, Director, Security Products, IDC Research Nico Popp, Vice President Information Protection, Symantec   Webcast Summary: The cloud has changed the way we do business and is forcing us to rethink security in new ways. The fact that information flows freely outside of the enterprise walls and back again means we need to consider how we secure that information ...
updated event 09 Mar 2015
Please join us for the next Philadelphia Security & Compliance User Group meeting on Wednesday March 11th from 9:00am to 12:00pm at Dave & Buster's. The meeting will feature presentations on SEP and DLP from Symantec. Lunch will be served! Agenda: Welcome, Announcements & Introductions Roadmap of Security Solutions by Neil Christie, Symantec SEP DLP Planning, Prizes and ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new video 04 May 2015
How to submit suspicious files with Threat Analysis Threat Analysis를 통해 탐지된 의심스러운 파일을 어떻게 판단하여 Symantec Security Response Team에 업로드 하는지 알아봅니다. 준비사항: 1. Threat Analysis by Symhelp tool 2. Threat Analysis Report Symhelp Download: http://www.symantec.com/business/support/index?page=content&id=TECH170752 Threat Analysis 사용 방법은 아래의 URL을 참고하시기 ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a client that is unable to communicate with the SEPM by reviewing settings and running SymHelp. You also learn how to deploy new communication settings to the client. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot and resolve a replication issue by examining Tomcat logs and other areas of the SEPM. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Communication Issues Troubleshooting Group Update ...
updated video 29 Apr 2015
In this short video, you learn how to configure a client as a GUP. You also learn how to configure clients to retreive LiveUpdate content from a GUP. In addition you learn how to ensure tha clients are retrieving content from a GUP. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a failed SEP client installation by reviewing key logs and running SymHelp and Windows Installer. You also learn how to successfully re-deploy the client. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a SEPM that cannot connect to LiveUpdate. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a Replication Issue Troubleshooting ...
updated video 29 Apr 2015
Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a Replication Issue Troubleshooting Performance Issues
updated video 29 Apr 2015
In this short video, you learn how to troublehoot a SEPM console connection issue with an MS SQL database. Please watch the other videos in this series: Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a ...
updated video 29 Apr 2015
In this short video, you learn how to idenitfy and troubleshoot SEP performance issues with Windows Task Manager and Symantec Help. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication ...
updated video 09 Apr 2015
This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small Business Edition account. In this video, you will ...
new idea 05 May 2015
With SEPM you only have a limited amount of options to specify for application control about the processes. You can match a process name, but a simple rename can render it pointless. You can also match a file fingerprint but again that is a chore in of itself as you have to constantly keep up on new versions to add more fingerprints, not to mention having to get fingerprints for older ...
new idea 01 May 2015
We could do with when distributing a package to user and no forced reboot is selected an option to at least notify the users once the package has been downloaded that the machine could do with a reboot to complete the upgrade at next earliest convinence. 
new idea 30 Apr 2015
i want to add all the feature of Host integrity policy on my SEPM console..
new idea 30 Apr 2015
i need to set up  email notification for host integrity policy..i found no option for that..there is a option for system notification not for email notification
updated idea 29 Apr 2015
We have SEP v12.x rolled out in a relatively large and extremely distributed enterprise environment with 400-500 subnets. Ideally, we would be able to report on unmanaged devices on the network, but the current process of creating an unmanaged detector (one by one) is extraordinarly cumbersome. The unmanaged detector feature is an excellent tool, but it's implementation in SEPM makes it ...
new idea 29 Apr 2015
It would be very useful if we could add a new Hardware Device to hardware devices list by issuing the both combination of Class ID and Device ID. This feature makes Hardware Device definition much more flexible. For example it would be so simple to block a USB Tethering mobile phone or USB connected Network Adapter by adding a new Hardware Device which is defined with ...
updated idea 28 Apr 2015
Currently in order to use sep with a different language you need to install a separate package corresponding to the specific language region In order to save space on the manager it would be beneficial if all languages could be integrated to a specific SEP platform.
updated idea 28 Apr 2015
My idea is to have default keyboard layout option during package creation. This would mean any machine that package is installed on would select that keyboard layout as default, this is because some of our people during testing have issues with special characters as we use English (UK) keyboards and the default is English (US) in the product. I believe this would save a lot of time and prevent ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1836
19
Mithun Sanghavi
1242
59
SMLatCST
383
1
jjesse
59
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.